(eset):research;

Research has been at the core of ESET and its technology since the company's inception. The journey began in 1987, when ESET co-founders Miroslav Trnka and Peter Paško uncovered one of the world's first computer viruses, which they named "Vienna" and wrote a program to detect it. Many other discoveries quickly followed.

More than 30 years later, ESET remains at the forefront of cybersecurity research, operating 13 R&D centers across the world that analyze, monitor and anticipate new threats. In recent years alone, ESET researchers have made a number of significant discoveries that shed light on various malicious campaigns orchestrated by the world’s most advanced threat actors. They have also identified multiple high-impact vulnerabilities in third-party products and services.

Over the years, ESET’s experts have assisted law enforcement with disruptions of several notorious cybercrime operations. They also frequently present at leading industry conferences and are among the most referenced contributors to the MITRE ATT&CK® knowledge base of adversary tactics and techniques.

@ESETresearch | ESET GitHub | ESET Coordinated Vulnerability Disclosure Policy


2231 articles

Mining Social Data Led to Johansson and Aguilera Hacks

Mining Social Data Led to Johansson and Aguilera Hacks

Mining Social Data Led to Johansson and Aguilera Hacks

Stephen Cobb12 Oct 2011


Scams

Google Eye Phish: Bait Me A Hook In The Morning

Google Eye Phish: Bait Me A Hook In The Morning

Scams

Google Eye Phish: Bait Me A Hook In The Morning

...I've been seeing quite a few scrawny, toothless piranha mailed from email addresses that are often spoofed but invariably dubious like google.phishing.team@a_latvian_mail_provider.com...

David Harley11 Oct 2011


Malware

Virus Bulletin 2011: Fake but free…

Virus Bulletin 2011: Fake but free…

Malware

Virus Bulletin 2011: Fake but free…

Robert Lipovsky11 Oct 2011


Government, Public Interest and Trojans

Government, Public Interest and Trojans

Government, Public Interest and Trojans

...this isn't lawful interception, and it's not surprising that the AV industry has seen no reason to avoid detecting it...

David Harley11 Oct 2011


Malware

German Policeware: Use the Farce...er, Force...Luke

German Policeware: Use the Farce...er, Force...Luke

Malware

German Policeware: Use the Farce...er, Force...Luke

Robert Lipovsky10 Oct 2011


Digital Security

Facebook: over 800 pages of data stored on a single user

Facebook: over 800 pages of data stored on a single user

Digital Security

Facebook: over 800 pages of data stored on a single user

Cameron Camp10 Oct 2011


National Cybersecurity Awareness Month: Do Your Bit!

National Cybersecurity Awareness Month: Do Your Bit!

National Cybersecurity Awareness Month: Do Your Bit!

Stephen Cobb10 Oct 2011


High tech identity theft ring largest in U.S. history

High tech identity theft ring largest in U.S. history

High tech identity theft ring largest in U.S. history

Cameron Camp07 Oct 2011


New white paper & presentations, and an SC Mag article

New white paper & presentations, and an SC Mag article

New white paper & presentations, and an SC Mag article

A new conference paper, two conference presentations, and an article for SC Magazine.

David Harley07 Oct 2011